Sciweavers

790 search results - page 49 / 158
» Designated Confirmer Signatures
Sort
View
STEP
2005
IEEE
14 years 2 months ago
Elemental Design Patterns Recognition In Java
The decomposition of design patterns into simpler elements may reduce significantly the creation of variants in forward engineering, while it increases the possibility of identify...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 2 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
CCS
1994
ACM
14 years 1 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
14 years 1 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
ACSAC
2005
IEEE
14 years 2 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan